The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Deqing Zou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou
    Joint Management of Authorization for Dynamic Virtual Organization. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:375-381 [Conf]
  2. Xuanhua Shi, Hai Jin, Zongfen Han, Weizhong Qiang, Song Wu, Deqing Zou
    ALTER: Adaptive Failure Detection Services for Grids. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:355-358 [Conf]
  3. Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou
    VO-Sec: An Access Control Framework for Dynamic Virtual Organization. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:370-381 [Conf]
  4. Deqing Zou, Laurence Tianruo Yang, Weizhong Qiang, Xueguang Chen, Zongfen Han
    An Authentication and Access Control Framework for Group Communication Systems in Grid Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:547-554 [Conf]
  5. Hanhua Chen, Hai Jin, Minghu Zhang, Pengliu Tan, Deqing Zou, Pingpeng Yuan
    Early Experience in QoS-Based Service Grid Architecture. [Citation Graph (0, 0)][DBLP]
    APWeb, 2004, pp:924-927 [Conf]
  6. Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou
    Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:227-235 [Conf]
  7. Hai Jin, Hanhua Chen, Jian Chen, Ping Kuang, Li Qi, Deqing Zou
    Real-Time Strategy and Practice in Service Grid. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:161-166 [Conf]
  8. Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou
    A Novel VO-Based Access Control Model for Grid. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:293-300 [Conf]
  9. Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou, Hao Zhang
    RB-GACA: A RBAC Based Grid Access Control Architecture. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:487-494 [Conf]
  10. Xuanhua Shi, Hai Jin, Weizhong Qiang, Deqing Zou
    An Adaptive Meta-scheduler for Data-Intensive Applications. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:830-837 [Conf]
  11. Xuanhua Shi, Hai Jin, Weizhong Qiang, Deqing Zou
    Reliability Analysis for Grid Computing. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:787-790 [Conf]
  12. Deqing Zou, Hai Jin, Xingchang Dong, Weizhong Qiang, Xuanhua Shi
    HH-MDS: A QoS-Aware Domain Divided Information Service. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:573-580 [Conf]
  13. Hai Jin, Muzhou Xiong, Song Wu, Deqing Zou
    Replica Based Distributed Metadata Management in Grid Environment. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2006, pp:1055-1062 [Conf]
  14. Feng Mao, Hai Jin, Deqing Zou, Baoli Chen, Li Qi
    QoS Oriented Dynamic Replica Cost Model for P2P Computing. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:822-828 [Conf]
  15. Deqing Zou, Weizhong Qiang, Xuanhua Shi
    A Formal General Framework and Service Access Model for Service Grid. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:349-356 [Conf]
  16. Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han, Deqing Zou
    A Data Mining Based Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:677-684 [Conf]
  17. Yunfa Li, Hai Jin, Zongfen Han, Chao Xie, Deqing Zou, Hao Wu
    Aeneas: Real-Time Performance Evaluation Approach for Distributed Programs with Reliability-Constrains. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  18. Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou
    A Novel Authorization Mechanism for Service-Oriented Virtual Organization. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2005, pp:382-391 [Conf]
  19. Hai Jin, Chuanjiang Yi, Song Wu, Li Qi, Deqing Zou
    Uniform Authorization Management in ChinaGrid Support Platform. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:223-231 [Conf]
  20. Hai Jin, Zhensong Liao, Deqing Zou, Weizhong Qiang
    A New Approach to Hide Policy for Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:168-178 [Conf]
  21. Hai Jin, Hanhua Chen, Minghu Zhang, Deqing Zou
    RT-Grid: A QoS Oriented Service Grid Framework. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2004, pp:345-348 [Conf]
  22. Hai Jin, Deqing Zou, Hanhua Chen, Jianhua Sun, Song Wu
    Fault-Tolerant Grid Architecture and Practice. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2003, v:18, n:4, pp:423-433 [Journal]
  23. Yunfa Li, Deqing Zou, Zongfen Han, Weizhong Qiang
    Research on Group Signature Scheme with Forward Security. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Research and Development, 2006, v:43, n:12, pp:2069-2075 [Journal]
  24. Yunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han
    A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:42-51 [Conf]
  25. Yunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han
    A Scalable Service Scheme for Secure Group Communication in Grid. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:31-38 [Conf]

  26. Trusted Deployment of Virtual Execution Environment in Grid Systems. [Citation Graph (, )][DBLP]


  27. A Trusted Group Signature Architecture in Virtual Computing Environment. [Citation Graph (, )][DBLP]


  28. An EMAIL Based Automated Trust Negotiation Model. [Citation Graph (, )][DBLP]


  29. A Hidden Credential Based Oblivious Automated Trust Negotiation Model. [Citation Graph (, )][DBLP]


  30. Service, Security and Its Data Management for Ubiquitous Computing - Overview. [Citation Graph (, )][DBLP]


  31. A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]


  32. VMFence: a customized intrusion prevention system in distributed virtual computing environment. [Citation Graph (, )][DBLP]


  33. Grid Security Interoperation between CGSP and VEGA. [Citation Graph (, )][DBLP]


  34. Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. [Citation Graph (, )][DBLP]


  35. A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. [Citation Graph (, )][DBLP]


  36. Extending HLA/RTI to WAN Based on Grid Service. [Citation Graph (, )][DBLP]


  37. SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002